Analysis
-
max time kernel
144s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2023, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
maxoysj4762.exe
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
maxoysj4762.exe
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
maxoysj4762.exe
-
Size
585KB
-
MD5
d6bf1f473ce21610f125492e27d1a4e4
-
SHA1
c51444cd94cbfb2f955f555feac4512ed7ef33d1
-
SHA256
898d893d7c46d0c70d498f0323b24175c4d49df99b88f57d30aef08cb3e3edca
-
SHA512
80bd6043c1db88b2c00225edfef7bc66f573421816c7b52f1a6478b09060dfd2b95994be549d11269f74b332c4cef8b79f9b430fb0da6ac21226b50ec1cc4b74
-
SSDEEP
12288:aHWHvZzn5JuHNKu0H4AMSpr7kIdhq8SKaGl7Cwu7k9QJ:a2Phn5otW4yZgmqjMZ6490
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Control Panel\International\Geo\Nation maxoysj4762.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 2044 1992 maxoysj4762.exe 29 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1992 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe 2044 maxoysj4762.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1992 maxoysj4762.exe Token: SeDebugPrivilege 2044 maxoysj4762.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1992 wrote to memory of 440 1992 maxoysj4762.exe 28 PID 1992 wrote to memory of 440 1992 maxoysj4762.exe 28 PID 1992 wrote to memory of 440 1992 maxoysj4762.exe 28 PID 1992 wrote to memory of 440 1992 maxoysj4762.exe 28 PID 1992 wrote to memory of 2044 1992 maxoysj4762.exe 29 PID 1992 wrote to memory of 2044 1992 maxoysj4762.exe 29 PID 1992 wrote to memory of 2044 1992 maxoysj4762.exe 29 PID 1992 wrote to memory of 2044 1992 maxoysj4762.exe 29 PID 1992 wrote to memory of 2044 1992 maxoysj4762.exe 29 PID 1992 wrote to memory of 2044 1992 maxoysj4762.exe 29 PID 1992 wrote to memory of 2044 1992 maxoysj4762.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"2⤵PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-